US20060072763A1 - Apparatus and method for storing data - Google Patents

Apparatus and method for storing data Download PDF

Info

Publication number
US20060072763A1
US20060072763A1 US11/244,007 US24400705A US2006072763A1 US 20060072763 A1 US20060072763 A1 US 20060072763A1 US 24400705 A US24400705 A US 24400705A US 2006072763 A1 US2006072763 A1 US 2006072763A1
Authority
US
United States
Prior art keywords
key
directory
data
content information
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/244,007
Inventor
Yong-kuk You
Yun-ho Choi
Chi-hurn Kim
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to US11/244,007 priority Critical patent/US20060072763A1/en
Assigned to SAMSUNG ELECTRONICS CO., LTD. reassignment SAMSUNG ELECTRONICS CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHOI, YUN-HO, KIM, CHI-HURN, YOU, YONG-KUK
Publication of US20060072763A1 publication Critical patent/US20060072763A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention relates to an apparatus and method for storing data, and more particularly, to an apparatus and method for storing data by dividing data into directories and separately encrypting or decrypting the directories, thereby minimizing consumption of resources required for encrypting and decrypting the directions.
  • AV audio/video
  • content is encrypted using a predetermined encryption key and stored on the hard disc in order that it not be reproduced without permission.
  • the content is reproduced by decrypting the encrypted content using a predetermined decryption key.
  • the decrypted content is encrypted using a predetermined encryption key again and stored on the hard disc.
  • a different encryption key is used whenever the content is encrypted to prevent the content from being hacked.
  • FIG. 1A is a block diagram of a conventional apparatus 10 , e.g., a DVD player, which reproduces data.
  • the apparatus 10 includes an external source 20 that provides content or content information, an external device 30 that uses the content or the content information, and a data storage device 40 that stores the content or the content information.
  • the content information includes a content name, a content key, usage rules, and other information which are required to reproduce the content.
  • the apparatus 10 cannot reproduce the content without the content information.
  • the external source 20 may be any device that can provide the content or content information from the outside of the apparatus 10 .
  • the external source 20 may be a videotape, a CD, a DVD, a satellite receiver, or a cable TV receiver.
  • the external device 30 is an apparatus, such as an MPEG decoder, which uses the content or the content information.
  • the data storage device 40 safely stores the content or the content information. That is, the data storage device 40 encrypts the content or the content information received from the external source 20 , stores the result of encryption, decrypts the result of encryption, and transmits the result of decryption to the external device 30 .
  • FIG. 1B illustrates a data structure of content information.
  • the content information required to reproduce the content is sorted out and stored in directories.
  • Each of the content information includes a content name, a content key, usage rules, and other information.
  • the content information of a first content is stored in a first directory
  • the content information of a second content is stored in a second directory.
  • the directories are stored in an area R of a hard disc of a data reproduction apparatus.
  • the directories are treated as a file, i.e., a content information file, which is encrypted using a predetermined key generated by the data reproduction apparatus.
  • the encryption key is referred to as a protection key, and stored in a safe region, e.g., a flash memory, of a data storage device, which cannot be separated from the data reproduction apparatus.
  • the protection key is extracted from the flash memory and used for decrypting the content information whenever an external device reproduces the content information.
  • FIG. 1C is a block diagram of a conventional apparatus 100 for storing data.
  • the apparatus 100 includes an encryption unit 110 , a random number generator 120 , a flash memory 130 , a decryption unit 140 , and a storage unit 150 .
  • the random number generator 120 generates random numbers and creates a first protection key 122 using the random numbers.
  • the first protection key 122 is used to protect content information stored in the apparatus 100 , i.e., it is used when encrypting and decrypting the content information.
  • the random number generator 120 creates the first protection key 122 by generating random numbers, and therefore, a different protection key is generated whenever an external device (not shown) requires a protection key.
  • the encryption unit 110 generates an encrypted content information file 112 by encrypting a content information file 102 , which is a file R containing content information given from an external source (not shown), using the first protection key 122 , and then stores the encrypted content information file 112 in the storage unit 150 .
  • the first protection key 122 created by the random number generator 120 is stored in the flash memory 130 .
  • the flash memory 130 is a secure region which cannot be separated from the apparatus 100 .
  • the decryption unit 140 extracts the encrypted content information file 112 from the storage unit 150 and the protection key 122 from the flash memory 130 , generates a decrypted content information file 142 by decrypting the encrypted content file 112 using the first protection key 122 , and provides the decrypted content information file 142 to the external device.
  • the decrypted content information file 142 is encrypted again by the encryption unit 110 and stored in the storage unit 150 .
  • a second protection key 124 is created by the random number generator 120 and used to encrypt the decrypted content information file.
  • the second protection key 124 is different from the first protection key 122 that was used to encrypt the content information file 102 .
  • FIG. 2 is a flowchart illustrating a conventional method of storing data in the apparatus of FIG. 1C .
  • the random number generator 120 generates random numbers and creates the first protection key 122 using the random numbers (operation 210 ).
  • the encryption unit 110 generates an encrypted content information file 112 by encrypting the content information file 102 using the first protection key 122 , and stores the encrypted content information file 112 in the storage unit 150 (operation 220 ).
  • the first protection key 122 is stored in the flash memory 130 (operation 230 ).
  • the decryption unit 140 extracts the encrypted content information file 112 from the data storage unit 150 and the first protection key 122 from the flash memory 130 (operation 250 ). Next, the decryption unit 140 generates the decrypted content information file 142 by decrypting the encrypted content information file 112 using the first protection key 122 , and provides the decrypted content information file 142 to the external device (operation 260 ). Next, the external device obtains the first protection key 122 from the decrypted content information file 142 and reproduces the desired content (operation 270 ).
  • an external device e.g., a DVD player
  • the decrypted content information file 142 is encrypted again by the encryption unit 110 and stored in the storage unit 150 . That is, the decrypted content information file 142 is encrypted again by performing operations 210 through 230 .
  • the second protection key 124 is created by the random number generator 120 and used to encrypt the decrypted content information file 142 .
  • the second protection key 124 is different from the first protection key 122 that was used to encrypt the content information file 102 .
  • the content information file is encrypted again by a protection key different from a protection key that was used to encrypt the content information file, thereby preventing the content information file from being hacked.
  • a conventional apparatus and method for storing data has a defect since a content information file containing one or more contents is encrypted using a protection key and stored. For instance, content information regarding a first content is changed by decoding the entire content information file, changing the content information regarding the first content, encrypting the entire content information file, and storing the result of encryption.
  • the entire content information file which is far longer than the content information, must be encrypted and decrypted to change the content information, thereby causing consumption of a large amount of resources.
  • the present invention provides an apparatus and method for storing data by separately encrypting and decrypting content information files in directories using different encryption keys, thereby effectively changing content information.
  • an apparatus for storing data in a device comprising a directory key generator generating a directory key required for encrypting and decrypting the data by inputting a device-specific key to a key generating function, the device-specific key being unique information allocated to the device and stored in a secure region of the device, wherein the data is stored in at least one directory, and the directory key is used in encrypting and decrypting the data in units of directories.
  • the apparatus further includes an encryption unit encrypting the data using the directory key, and a storage unit storing the encrypted data in units of directories.
  • the directory key generator generates the directory key by inputting the device-specific key and directory information, which specifies the directory, into the key generating function when the device requests the data.
  • the directory information comprises at least one of the name of the directory, the storing capacity of the directory, the name of the data stored in the directory, and a time when the data is stored in the directory.
  • the apparatus further includes a decryption unit generating decrypted data by reading the encrypted data from the storage unit and decrypting the encrypted data using the directory key when the device requests the data.
  • the directory key may be obtained using a device key allocated to the device during broadcast encryption.
  • the device-specific key may be a unique device key allocated to the device, and the unique device key is selected from device keys allocated using broadcast encryption.
  • identification data of the device key is stored outside the device or together with encrypted data.
  • a key used in encrypting a directory is obtained from the AS center using the identification data of the device key. Then, encrypted content can be used using the obtained key.
  • a method of storing data in a device comprising generating a directory key by inputting a device-specific key into a key generating function, the directory key used to encrypt and decrypt the data, the device-specific key allocated to the device and stored in a secure region of the device, wherein the data is stored in at least one directory, and the directory key is used to encrypt and decrypt the data in units of directories.
  • FIG. 1A is a block diagram of a conventional apparatus, e.g., a DVD player, which reproduces data;
  • FIG. 1B illustrates a data structure of general content information
  • FIG. 1C is a block diagram of a conventional apparatus for storing data
  • FIG. 2 is a flowchart illustrating a method of storing data using the apparatus of FIG. 1C ;
  • FIG. 3 is a block diagram of an apparatus for storing data according to an embodiment of the present invention.
  • FIG. 4 is a block diagram of an apparatus for storing data according to another embodiment of the present invention.
  • FIGS. 5A through 5D illustrate key generating functions
  • FIG. 6 is a flowchart illustrating a method of storing data according to an embodiment of the present invention.
  • FIG. 7 is a flowchart illustrating a method of storing data according to another embodiment of the present invention.
  • FIGS. 8A and 8B are diagrams illustrating methods of using content information stored using a method according to the present invention, according to embodiments of the present invention.
  • FIGS. 8C and 8D are diagrams illustrating methods of changing content information stored using a method according to the present invention, according to embodiments of the present invention.
  • FIGS. 8E and 8F are diagrams illustrating methods of deleting content information stored using a method according to the present invention, according to embodiments of the present invention.
  • FIG. 3 is a block diagram of an apparatus 300 for storing data according to an embodiment of the present invention.
  • the apparatus 300 includes an encryption unit 310 , a directory key generator 320 , a key storing unit 340 , a storage unit 350 , and a decryption unit 360 .
  • the operation of the apparatus 300 will now be described with respect to two cases where content information 302 is obtained from an external source and stored in the apparatus 300 , and where content information 362 is extracted from the apparatus 300 when an external device requests the content information 362 .
  • the directory key generator 320 When the encryption unit 310 receives the content information 302 from an external source, the directory key generator 320 generates a directory key 322 by inputting a device-specific key 342 given from the key storing unit 340 to a key generating function ⁇ ( ). The generated directory key 322 is used to encrypt and decrypt the content information 302 .
  • the device-specific key 342 is unique information given to the apparatus 300 .
  • the device-specific key 342 is stored in the key storing unit 340 .
  • the key storing unit 340 is a secure region such as a flash memory.
  • the device-specific key 342 may be a unique device key peculiarly allocated to a device during a broadcast encryption process. That is, the unique device key matches a particular device and is selected from a set of device keys allocated to a plurality of devices during the broadcast encryption process.
  • the particular device key 342 may be a unique secret key allocated to a data storage apparatus that uses a public key structure that requires a pair of a secret key and a public key.
  • the particular device 342 may be unique information given to an apparatus for storing data, using various methods.
  • the directory key 322 is characteristic to the apparatus for storing data, thereby accomplishing binding of content to a particular device.
  • the encryption unit 310 generates encrypted content information 312 by encrypting the content information 302 using the directory key 322 , and stores the encrypted content information 312 in the storage unit 350 .
  • the directory key generator 320 When the external device requests the encrypted content information 312 , the directory key generator 320 generates a directory key 324 by inputting the device-specific key 342 given from the key storing unit 340 to a key generating function ⁇ ( ).
  • the decryption unit 360 extracts the encrypted content information 312 from the storage unit 350 , and generates decrypted content information 362 by decrypting the encrypted content information 352 using the directory key 324 .
  • the decrypted content information 362 is transmitted to the external device. After the external device uses the decrypted content information 362 , the decrypted content information 362 is encrypted again by the encryption unit 310 and stored in the storage unit 350 . For instance, when a content key is included in content information and an external device is a moving image reproduction apparatus that desires to reproduce encrypted content, the external device requests a data reproduction apparatus to provide content information. However, since the content information is encrypted, it must be decrypted and provided to the external device, and then encrypted and stored again in a storage unit of the data reproduction apparatus unit.
  • the content information 312 is stored in and extracted from the storage unit 350 in units of directories in the apparatus 300 of FIG. 3 , not a content information file as represented in FIG. 1B in the apparatus 100 of FIG. 1C . That is, according to the present invention, only content information stored in one of the directories is encrypted and decrypted, thereby minimizing consumption of resources required for the encryption and decryption.
  • FIG. 4 is a block diagram of an apparatus 400 for storing data according to another embodiment of the present invention.
  • the apparatus 400 includes an encryption unit 410 , a directory key generator 420 , a directory information storing unit 430 , a key storing unit 440 , a storage unit 450 , and a decryption unit 460 .
  • the directory key generator 420 when content information 402 is input to the encryption unit 410 from an external source, the directory key generator 420 generates a directory key 422 by inputting a device-specific key 442 given from the key storing unit 440 and directory information 432 given from the directory information storing unit 430 to a key generating function ⁇ ( ).
  • the directory key 422 is used to encrypt and decrypt the content information 402 .
  • the device-specific key 442 is peculiarly allocated to the apparatus 400 and stored in a secure region of the apparatus 400 .
  • the directory information 432 specifies directories such as those illustrated in FIG. 1B , which can be disclosed to the public.
  • the directory information 432 may include directory names, the names of contents stored in the directories, the lengths of the contents, and time when each of the content is stored.
  • the directory information 432 may be stored in a region of the apparatus 400 , the safety of which is not guaranteed.
  • the device-specific key 442 is information peculiarly given to the apparatus 400 and the directory key 422 is generated using the device-specific key 442 . Therefore, the directory key 422 is also characteristic to the apparatus 400 , thereby accomplishing binding content to a specific device.
  • the encryption unit 410 generates encrypted content information 412 by encrypting the content information 402 using the directory key 422 , and stores it in the storage unit 450 .
  • the directory key generator 420 When an external device requests the encrypted content information 412 , the directory key generator 420 generates a directory key 424 by inputting the device-specific key 442 given from the key storing unit 440 to a key generating function ⁇ ( ).
  • the decryption unit 460 extracts the encrypted content information 412 from the storage unit 450 , and generates decrypted content information 462 by decrypting the encrypted content information 412 using the directory key 424 .
  • the decrypted content information 462 is transmitted to the external device. After the external device uses the decrypted content information 462 , the decrypted content information 462 is encrypted again by the encryption unit 410 and stored in the storage unit 450 .
  • the external device requests a data storing apparatus to provide the content information.
  • the content information is encrypted, it must be decrypted and then provided to the external device, and encrypted and stored again as described above.
  • FIGS. 5A through 5D illustrate key generating functions.
  • directory keys K 1 , K 2 , . . . , K n which are respectively used to encrypt content information files in directories, correspond to a device-specific key K used to encrypt content information files in directories.
  • the device-specific key K may be a unique device key or a secret key given to the apparatus 300 .
  • all content information I 1 , I 2 , . . . , I n are encrypted using the directory keys K 1 , K 2 , . . . , K n which are equal to one another.
  • directory keys K 1 , K 2 , . . . , K n are generated using a device-specific key K and directory information D 1 , D 2 , . . . , D n , respectively.
  • D 1 , D 2 , . . . , Dn directory information regarding directories 1 , 2 , . . . , n
  • denotes an XOR operation.
  • the device-specific key K or the directory information D 1 , D 2 , . . . , Dn may be hashed to equalize bit value(s) thereof before the XOR operation is performed thereon.
  • E(K,Dn) denotes a value obtained by encrypting the directory information Dn using the device-specific key K.
  • directory keys K 1 , K 2 , . . . , K n are generated using a device-specific key K and random numbers R 1 , R 2 , . . . Rn, respectively.
  • R 1 , R 2 , . . . , Rn denote random numbers that are allocated to directories 1 , 2 , . . . , n, respectively, and newly generated whenever content information is stored in the directories 1 , 2 , . . . , n.
  • the random numbers R 1 , R 2 . . . . , Rn are stored in the apparatus 400 , and extracted whenever the content information is used.
  • an after-sales service (AS) center To enable a data storing apparatus to generate a directory key using a device-specific key, an after-sales service (AS) center must be aware of the device-specific key peculiarly given to the data storing apparatus.
  • AS after-sales service
  • a storage unit must be installed into new hardware due to a fault of the data storing apparatus, and a new storage unit must be installed into the data storing apparatus due to the overflow of the storage unit.
  • the AS center must be aware of the device-specific key to allow the data storing apparatus to decrypt encrypted content information. Therefore, a serial number allocated to the data storing apparatus is marked on the exterior of the data storing apparatus, and the device-specific key and a table that match the serial number are provided to the AS center.
  • the AS center When exchanging the storage unit with a new one, the AS center records a device-specific key matching the data storing apparatus in a flash memory of the exchanged data storing apparatus.
  • a directory key may be generated using a set of device keys.
  • each of data storing apparatuses includes a device key set composed of at least one device key, e.g., DK 1 , DK 2 , . . . , DKm.
  • the device key DK 1 , DK 2 , . . . , DKm may be used as directory keys.
  • some of the device keys DK 1 , DK 2 , DKm are shared by another data storing apparatus. If the device keys DK 1 , DK 2 , DK 4 , DK 6 , and DK 7 are allocated to a data storing apparatus A and the device keys DK 1 , DK 2 , DK 4 , DK 6 , and DK 9 are allocated to a data storing apparatus B, the data storing apparatus A can decrypt directories stored in the data storing apparatus B using the device keys DK 1 , DK 2 , DK 4 , and DK 6 .
  • directory keys are generated to be characteristic to a data storing apparatus, using a device key.
  • the directory keys may be generated using the device key, i.e., a unique device key DKm, which is peculiarly allocated to the data storing device.
  • Equation (7) the number m of device keys must be greater than the number n of directory keys, i.e., m>n.
  • FIG. 6 is a flowchart illustrating a method of storing data using the apparatus 300 of FIG. 3 , according to an embodiment of the present invention.
  • the directory key generator 320 when the content information 302 is obtained from an external source, the directory key generator 320 generates the directory key 322 by inputting the device-specific key 342 given from the key storing unit 340 to a key generating function ⁇ ( ) (operation 610 ).
  • the device-specific key 342 may be a unique device key allocated to the apparatus 300 during broadcast encryption.
  • the unique device key is allocated to a data storing apparatus, selected from a set of device keys allocated to a plurality of data storing apparatuses during broadcast encryption.
  • the device-specific key 342 may be a unique secret key allocated to the apparatus 300 when the data storing apparatus uses a public key structure that requires a pair of a secret key and a public key.
  • the device-specific key 342 may be any unique information provided to the apparatus 300 , using various methods.
  • the encryption unit 310 generates the encrypted content information 312 by encrypting the content information 302 using the directory key 322 , and stores the encrypted content information 312 in the storage unit 350 (operation 620 ).
  • the directory key generator 320 when an external device requests the encrypted content information 312 , the directory key generator 320 generate the directory key 342 by inputting the device-specific key 342 given from the key storing unit 340 to a key generating function ⁇ ( ) (operation 630 ).
  • the decryption unit 360 extracts the encrypted content information 312 from the storage unit 350 , and generates the decrypted content information 362 by decrypting the encrypted content information 312 using the directory key 324 (operation 640 ).
  • the decrypted content information 362 is transmitted to the external device, and encrypted again by the encryption unit 310 and stored in the storage unit 350 after the external device uses the decrypted content information 362 (operation 650 ).
  • FIG. 7 is a flowchart illustrating a method of storing data using the apparatus 400 of FIG. 4 , according to another embodiment of the present invention.
  • the directory key generator 420 when the content information 402 is obtained from an external source, the directory key generator 420 generates the directory key 422 by inputting the device-specific key 442 given from the key storing unit 440 and the directory information 432 given from the directory storing unit 430 to a key generating function ⁇ ( ) (operation 710 ).
  • the key generating function ⁇ ( ) may be selected from the functions illustrated in FIG. 5B through 5D .
  • the encryption unit 410 generates the encrypted content information 412 by encrypting the content information 402 using the directory key 422 , and stores the encrypted content information 412 in the storage unit 450 (operation 720 ).
  • the directory key generator 420 when an external device requests the encrypted content information 412 , the directory key generator 420 generates the directory key 424 by inputting the device-specific key 442 given from the key storing unit 440 to the key generating function ⁇ ( ) (operation 730 ).
  • the decryption unit 460 extracts the encrypted content information 412 from the storage unit 450 , and generates the decrypted content information 462 by decrypting the encrypted content information 412 using the directory key 424 (operation 740 ).
  • the decrypted content information 462 is transmitted to the external device, and encrypted again by the encryption unit 410 and stored in the storage unit 450 after the external uses the decrypted content information 462 (operation 750 ).
  • FIGS. 8A and 8B are diagrams illustrating methods of using encrypted content information E(K 1 ,I 1 ), which is stored using a method according to embodiments of the present invention.
  • the encrypted content information E(K 1 ,I 1 ) is decrypted using a directory key K 1 , and then encrypted using the directory key K 1 and stored in a storage unit. That is, the directory key K 1 is used in encrypting and decrypting the encrypted content information E(K 1 ,I 1 ), since the directory key K 1 is generated using the device-specific key K and directory information D 1 that will not be changed.
  • the encrypted content information E(K 1 ,I 1 ) is decrypted using a directory key K 1 , and then, encrypted using a directory key K 1 ′ and stored in a storage unit.
  • the directory key K 1 ′ is different from the directory key K 1 , since the directory key K 1 ′ is generated using a device-specific key K and a random number R 1 .
  • the random number R 1 changes every time a random number is generated, and is stored in a data storing apparatus.
  • FIGS. 8C and 8D are diagrams illustrating methods of changing encrypted content information E(K 1 ,I 1 ) stored using a method according to the present invention, according to embodiments of the present invention.
  • the methods of FIGS. 8C and 8D are the same as those of FIGS. 8A and 8B , except that content information I 1 is changed into content information I 1 ′.
  • FIGS. 8E and 8F are diagrams illustrating a method of deleting encrypted content information E(K 1 ,I 1 ) stored using a method according to the present invention, according to embodiments of the present invention.
  • encryption and decryption are performed in units of directories according to the present invention, and thus, decryption is not required in deleting the content information I 1 .
  • decryption is not required in deleting the content information I 1 .
  • conventionally since a content information file is totally encrypted, it must be encrypted again even when only one piece of content information stored in the content information file is deleted.
  • a method of storing data according to the present invention enables a piece of content information stored in a content information file to be deleted without having to encrypt again the content information file, thereby reducing consumption of resources.
  • the present invention has been described with respect to content information, the present invention is not limited to this type of information. That is, the present invention can be applied to various types of data that can be divided in units of directories.
  • the present invention can be embodied as a computer readable program. Codes or code segments constituting the program could have been easily derived by computer programmers in the art.
  • the program can be stored in a computer readable medium, and a method of storing data according to the present invention is performed when the program is read and executed using a computer.
  • the computer readable medium may be any recording apparatus capable of storing data that is read by a computer system, e.g., a magnetic recording medium, an optical recording medium, and a carrier wave.
  • data which is to be stored in a data storing apparatus, is divided into units of directories in which the data will be input to or output from the data storing apparatus, and the respective directories are encrypted using different directory keys, thereby minimizing consumption of resources required for encryption and decryption.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

Provided are an apparatus and method for storing data. The apparatus includes a directory key generator generating a directory key required for encrypting and decrypting the data by inputting a device-specific key to a key generating function, the device-specific key being unique information allocated to the device and stored in a secure region of the device. The data is stored in at least one directory, and the directory key is used in encrypting and decrypting the data in units of directories. Accordingly, it is possible to minimize consumption of resources required to encrypt and decrypt the data.

Description

    CROSS-REFERENCE TO RELATED PATENT APPLICATIONS
  • This application claims the priorities of U.S. Provisional Application No. 60/616,119, filed on Oct. 6, 2004 in the USPTO, and Korean Patent Application No. 10-2004-0086134, filed on Oct. 27, 2004 in the Korean Intellectual Property Office, the disclosures of which are incorporated herein in their entirety by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to an apparatus and method for storing data, and more particularly, to an apparatus and method for storing data by dividing data into directories and separately encrypting or decrypting the directories, thereby minimizing consumption of resources required for encrypting and decrypting the directions.
  • 2. Description of the Related Art
  • In recent years, home appliances, such as digital versatile disc (DVD) players, have been developed to include a hard disc to store content such as audio/video (AV) data thereon. In general, content is encrypted using a predetermined encryption key and stored on the hard disc in order that it not be reproduced without permission. The content is reproduced by decrypting the encrypted content using a predetermined decryption key. After reproduction, the decrypted content is encrypted using a predetermined encryption key again and stored on the hard disc. In other words, a different encryption key is used whenever the content is encrypted to prevent the content from being hacked.
  • FIG. 1A is a block diagram of a conventional apparatus 10, e.g., a DVD player, which reproduces data. The apparatus 10 includes an external source 20 that provides content or content information, an external device 30 that uses the content or the content information, and a data storage device 40 that stores the content or the content information. The content information includes a content name, a content key, usage rules, and other information which are required to reproduce the content. The apparatus 10 cannot reproduce the content without the content information.
  • The external source 20 may be any device that can provide the content or content information from the outside of the apparatus 10. For instance, the external source 20 may be a videotape, a CD, a DVD, a satellite receiver, or a cable TV receiver.
  • The external device 30 is an apparatus, such as an MPEG decoder, which uses the content or the content information.
  • The data storage device 40 safely stores the content or the content information. That is, the data storage device 40 encrypts the content or the content information received from the external source 20, stores the result of encryption, decrypts the result of encryption, and transmits the result of decryption to the external device 30.
  • FIG. 1B illustrates a data structure of content information. Referring to FIG. 1B, the content information required to reproduce the content is sorted out and stored in directories. Each of the content information includes a content name, a content key, usage rules, and other information.
  • Referring to FIG. 1B, the content information of a first content is stored in a first directory, and the content information of a second content is stored in a second directory. Since the content information is indispensable to securing copyright for the content, the directories are stored in an area R of a hard disc of a data reproduction apparatus. The directories are treated as a file, i.e., a content information file, which is encrypted using a predetermined key generated by the data reproduction apparatus. The encryption key is referred to as a protection key, and stored in a safe region, e.g., a flash memory, of a data storage device, which cannot be separated from the data reproduction apparatus. The protection key is extracted from the flash memory and used for decrypting the content information whenever an external device reproduces the content information.
  • FIG. 1C is a block diagram of a conventional apparatus 100 for storing data. The apparatus 100 includes an encryption unit 110, a random number generator 120, a flash memory 130, a decryption unit 140, and a storage unit 150.
  • The random number generator 120 generates random numbers and creates a first protection key 122 using the random numbers. The first protection key 122 is used to protect content information stored in the apparatus 100, i.e., it is used when encrypting and decrypting the content information. The random number generator 120 creates the first protection key 122 by generating random numbers, and therefore, a different protection key is generated whenever an external device (not shown) requires a protection key.
  • The encryption unit 110 generates an encrypted content information file 112 by encrypting a content information file 102, which is a file R containing content information given from an external source (not shown), using the first protection key 122, and then stores the encrypted content information file 112 in the storage unit 150.
  • The first protection key 122 created by the random number generator 120 is stored in the flash memory 130. The flash memory 130 is a secure region which cannot be separated from the apparatus 100.
  • When an external device (not shown) requests the content information, the decryption unit 140 extracts the encrypted content information file 112 from the storage unit 150 and the protection key 122 from the flash memory 130, generates a decrypted content information file 142 by decrypting the encrypted content file 112 using the first protection key 122, and provides the decrypted content information file 142 to the external device.
  • After the external device uses the decrypted content information file 142, the decrypted content information file 142 is encrypted again by the encryption unit 110 and stored in the storage unit 150. In this case, a second protection key 124 is created by the random number generator 120 and used to encrypt the decrypted content information file. The second protection key 124 is different from the first protection key 122 that was used to encrypt the content information file 102.
  • FIG. 2 is a flowchart illustrating a conventional method of storing data in the apparatus of FIG. 1C. Referring to FIG. 2, the random number generator 120 generates random numbers and creates the first protection key 122 using the random numbers (operation 210).
  • Next, the encryption unit 110 generates an encrypted content information file 112 by encrypting the content information file 102 using the first protection key 122, and stores the encrypted content information file 112 in the storage unit 150 (operation 220).
  • Next, the first protection key 122 is stored in the flash memory 130 (operation 230).
  • When an external device, e.g., a DVD player, requests the content information file 102 to obtain the first content key 122 (operation 240), the decryption unit 140 extracts the encrypted content information file 112 from the data storage unit 150 and the first protection key 122 from the flash memory 130 (operation 250). Next, the decryption unit 140 generates the decrypted content information file 142 by decrypting the encrypted content information file 112 using the first protection key 122, and provides the decrypted content information file 142 to the external device (operation 260). Next, the external device obtains the first protection key 122 from the decrypted content information file 142 and reproduces the desired content (operation 270).
  • After the external device reproduces the content, the decrypted content information file 142 is encrypted again by the encryption unit 110 and stored in the storage unit 150. That is, the decrypted content information file 142 is encrypted again by performing operations 210 through 230. In this case, the second protection key 124 is created by the random number generator 120 and used to encrypt the decrypted content information file 142. The second protection key 124 is different from the first protection key 122 that was used to encrypt the content information file 102. In other words, after the external device uses a content information file to reproduce content, the content information file is encrypted again by a protection key different from a protection key that was used to encrypt the content information file, thereby preventing the content information file from being hacked.
  • However, a conventional apparatus and method for storing data has a defect since a content information file containing one or more contents is encrypted using a protection key and stored. For instance, content information regarding a first content is changed by decoding the entire content information file, changing the content information regarding the first content, encrypting the entire content information file, and storing the result of encryption.
  • That is, even if the length of content information to be changed is short, the entire content information file, which is far longer than the content information, must be encrypted and decrypted to change the content information, thereby causing consumption of a large amount of resources.
  • SUMMARY OF THE INVENTION
  • The present invention provides an apparatus and method for storing data by separately encrypting and decrypting content information files in directories using different encryption keys, thereby effectively changing content information.
  • According to one aspect of the present invention, there is provided an apparatus for storing data in a device, the apparatus comprising a directory key generator generating a directory key required for encrypting and decrypting the data by inputting a device-specific key to a key generating function, the device-specific key being unique information allocated to the device and stored in a secure region of the device, wherein the data is stored in at least one directory, and the directory key is used in encrypting and decrypting the data in units of directories.
  • The apparatus further includes an encryption unit encrypting the data using the directory key, and a storage unit storing the encrypted data in units of directories.
  • The directory key generator generates the directory key by inputting the device-specific key and directory information, which specifies the directory, into the key generating function when the device requests the data.
  • The directory information comprises at least one of the name of the directory, the storing capacity of the directory, the name of the data stored in the directory, and a time when the data is stored in the directory.
  • The apparatus further includes a decryption unit generating decrypted data by reading the encrypted data from the storage unit and decrypting the encrypted data using the directory key when the device requests the data.
  • The directory key may be obtained using a device key allocated to the device during broadcast encryption. The device-specific key may be a unique device key allocated to the device, and the unique device key is selected from device keys allocated using broadcast encryption.
  • Accordingly, it is possible to check whether the device-specific key matches the device through an after-sales service center, thereby increasing convenience in providing after-sales service, e.g., when exchanging devices. Specifically, identification data of the device key is stored outside the device or together with encrypted data. When a current device must be exchanged with another device, a key used in encrypting a directory is obtained from the AS center using the identification data of the device key. Then, encrypted content can be used using the obtained key.
  • According to another aspect of the present invention, there is provided a method of storing data in a device, the method comprising generating a directory key by inputting a device-specific key into a key generating function, the directory key used to encrypt and decrypt the data, the device-specific key allocated to the device and stored in a secure region of the device, wherein the data is stored in at least one directory, and the directory key is used to encrypt and decrypt the data in units of directories.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above and other aspects and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings in which:
  • FIG. 1A is a block diagram of a conventional apparatus, e.g., a DVD player, which reproduces data;
  • FIG. 1B illustrates a data structure of general content information;
  • FIG. 1C is a block diagram of a conventional apparatus for storing data;
  • FIG. 2 is a flowchart illustrating a method of storing data using the apparatus of FIG. 1C;
  • FIG. 3 is a block diagram of an apparatus for storing data according to an embodiment of the present invention;
  • FIG. 4 is a block diagram of an apparatus for storing data according to another embodiment of the present invention;
  • FIGS. 5A through 5D illustrate key generating functions;
  • FIG. 6 is a flowchart illustrating a method of storing data according to an embodiment of the present invention;
  • FIG. 7 is a flowchart illustrating a method of storing data according to another embodiment of the present invention;
  • FIGS. 8A and 8B are diagrams illustrating methods of using content information stored using a method according to the present invention, according to embodiments of the present invention;
  • FIGS. 8C and 8D are diagrams illustrating methods of changing content information stored using a method according to the present invention, according to embodiments of the present invention; and
  • FIGS. 8E and 8F are diagrams illustrating methods of deleting content information stored using a method according to the present invention, according to embodiments of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. Like reference numerals are used to designate like or equivalent elements throughout this disclosure.
  • FIG. 3 is a block diagram of an apparatus 300 for storing data according to an embodiment of the present invention. The apparatus 300 includes an encryption unit 310, a directory key generator 320, a key storing unit 340, a storage unit 350, and a decryption unit 360.
  • The operation of the apparatus 300 will now be described with respect to two cases where content information 302 is obtained from an external source and stored in the apparatus 300, and where content information 362 is extracted from the apparatus 300 when an external device requests the content information 362.
  • When the encryption unit 310 receives the content information 302 from an external source, the directory key generator 320 generates a directory key 322 by inputting a device-specific key 342 given from the key storing unit 340 to a key generating function ƒ( ). The generated directory key 322 is used to encrypt and decrypt the content information 302.
  • According to an embodiment of the present invention, the device-specific key 342 is unique information given to the apparatus 300. The device-specific key 342 is stored in the key storing unit 340. The key storing unit 340 is a secure region such as a flash memory.
  • Alternatively, the device-specific key 342 may be a unique device key peculiarly allocated to a device during a broadcast encryption process. That is, the unique device key matches a particular device and is selected from a set of device keys allocated to a plurality of devices during the broadcast encryption process.
  • Alternatively, the particular device key 342 may be a unique secret key allocated to a data storage apparatus that uses a public key structure that requires a pair of a secret key and a public key.
  • Alternatively, the particular device 342 may be unique information given to an apparatus for storing data, using various methods.
  • Since the device-specific key 342 is unique information allocated to the apparatus 300 and the directory key 322 is generated using the device-specific key 342, the directory key 322 is characteristic to the apparatus for storing data, thereby accomplishing binding of content to a particular device.
  • The encryption unit 310 generates encrypted content information 312 by encrypting the content information 302 using the directory key 322, and stores the encrypted content information 312 in the storage unit 350.
  • When the external device requests the encrypted content information 312, the directory key generator 320 generates a directory key 324 by inputting the device-specific key 342 given from the key storing unit 340 to a key generating function ƒ( ).
  • Then, the decryption unit 360 extracts the encrypted content information 312 from the storage unit 350, and generates decrypted content information 362 by decrypting the encrypted content information 352 using the directory key 324.
  • The decrypted content information 362 is transmitted to the external device. After the external device uses the decrypted content information 362, the decrypted content information 362 is encrypted again by the encryption unit 310 and stored in the storage unit 350. For instance, when a content key is included in content information and an external device is a moving image reproduction apparatus that desires to reproduce encrypted content, the external device requests a data reproduction apparatus to provide content information. However, since the content information is encrypted, it must be decrypted and provided to the external device, and then encrypted and stored again in a storage unit of the data reproduction apparatus unit.
  • As described above, the content information 312 is stored in and extracted from the storage unit 350 in units of directories in the apparatus 300 of FIG. 3, not a content information file as represented in FIG. 1B in the apparatus 100 of FIG. 1C. That is, according to the present invention, only content information stored in one of the directories is encrypted and decrypted, thereby minimizing consumption of resources required for the encryption and decryption.
  • FIG. 4 is a block diagram of an apparatus 400 for storing data according to another embodiment of the present invention. The apparatus 400 includes an encryption unit 410, a directory key generator 420, a directory information storing unit 430, a key storing unit 440, a storage unit 450, and a decryption unit 460.
  • Referring to FIG. 4, when content information 402 is input to the encryption unit 410 from an external source, the directory key generator 420 generates a directory key 422 by inputting a device-specific key 442 given from the key storing unit 440 and directory information 432 given from the directory information storing unit 430 to a key generating function ƒ( ). The directory key 422 is used to encrypt and decrypt the content information 402.
  • Similarly, the device-specific key 442 is peculiarly allocated to the apparatus 400 and stored in a secure region of the apparatus 400.
  • The directory information 432 specifies directories such as those illustrated in FIG. 1B, which can be disclosed to the public. The directory information 432 may include directory names, the names of contents stored in the directories, the lengths of the contents, and time when each of the content is stored. The directory information 432 may be stored in a region of the apparatus 400, the safety of which is not guaranteed.
  • Similar to the apparatus 300 of FIG. 3, the device-specific key 442 is information peculiarly given to the apparatus 400 and the directory key 422 is generated using the device-specific key 442. Therefore, the directory key 422 is also characteristic to the apparatus 400, thereby accomplishing binding content to a specific device.
  • The encryption unit 410 generates encrypted content information 412 by encrypting the content information 402 using the directory key 422, and stores it in the storage unit 450.
  • When an external device requests the encrypted content information 412, the directory key generator 420 generates a directory key 424 by inputting the device-specific key 442 given from the key storing unit 440 to a key generating function ƒ( ).
  • The decryption unit 460 extracts the encrypted content information 412 from the storage unit 450, and generates decrypted content information 462 by decrypting the encrypted content information 412 using the directory key 424.
  • The decrypted content information 462 is transmitted to the external device. After the external device uses the decrypted content information 462, the decrypted content information 462 is encrypted again by the encryption unit 410 and stored in the storage unit 450. When a content key is included in content information and an external device is a moving image reproduction apparatus that desires to reproduce encrypted content, the external device requests a data storing apparatus to provide the content information. However, since the content information is encrypted, it must be decrypted and then provided to the external device, and encrypted and stored again as described above.
  • If the key generating function f( ) described with reference to FIG. 3 and FIG. 4 produces directory keys K1, K2, . . . , Kn using a device-specific key K, the type of the key generating function ƒ( ) is not limited. FIGS. 5A through 5D illustrate key generating functions.
  • Referring to FIG. 5A, directory keys K1, K2, . . . , Kn, which are respectively used to encrypt content information files in directories, correspond to a device-specific key K used to encrypt content information files in directories. As previously mentioned, the device-specific key K may be a unique device key or a secret key given to the apparatus 300. The directory keys K1, K2, . . . , Kn are given by: K 1 = f ( K ) = K K 2 = f ( K ) = K K n = f ( K ) = K ( 1 )
  • Accordingly, all content information I1, I2, . . . , In are encrypted using the directory keys K1, K2, . . . , Kn which are equal to one another.
  • Referring to FIGS. 5B and 5C, directory keys K1, K2, . . . , Kn are generated using a device-specific key K and directory information D1, D2, . . . , Dn, respectively. The directory keys K1, K2, . . . , Kn of FIG. 5B and the directory keys K1, K2, . . . , Kn of FIG. 5C are given by: K 1 = f ( K , D1 ) = K D1 K 2 = f ( K , D2 ) = K D2 K n = f ( K , Dn ) = K Dn , ( 2 )
    wherein D1, D2, . . . , Dn denote directory information regarding directories 1, 2, . . . , n, and ⊕ denotes an XOR operation.
  • The device-specific key K or the directory information D1, D2, . . . , Dn may be hashed to equalize bit value(s) thereof before the XOR operation is performed thereon. K 1 = f ( K , D1 ) = E ( K , D1 ) K 2 = f ( K , D2 ) = E ( K , D2 ) K n = f ( K , Dn ) = E ( K , Dn ) , ( 3 )
    wherein E(K,Dn) denotes a value obtained by encrypting the directory information Dn using the device-specific key K.
  • Referring to FIG. 5D, directory keys K1, K2, . . . , Kn are generated using a device-specific key K and random numbers R1, R2, . . . Rn, respectively. The directory keys K1, K2, . . . , Kn of FIG. 5D are given by: K 1 = f ( K , R1 ) = K R1 ( 4 ) K 2 = f ( K , R2 ) = K R2 K n = f ( K , Rn ) = K Rn , K 1 = f ( K , R1 ) = E ( K , R1 ) ( 5 ) K 2 = f ( K , R2 ) = E ( K , R2 ) K n = f ( K , Rn ) = E ( K , Rn ) ,
    wherein R1, R2, . . . , Rn denote random numbers that are allocated to directories 1, 2, . . . , n, respectively, and newly generated whenever content information is stored in the directories 1, 2, . . . , n.
  • The random numbers R1, R2 . . . . , Rn are stored in the apparatus 400, and extracted whenever the content information is used.
  • In general, to enable a data storing apparatus to generate a directory key using a device-specific key, an after-sales service (AS) center must be aware of the device-specific key peculiarly given to the data storing apparatus. There are cases where a storage unit must be installed into new hardware due to a fault of the data storing apparatus, and a new storage unit must be installed into the data storing apparatus due to the overflow of the storage unit. In these cases, the AS center must be aware of the device-specific key to allow the data storing apparatus to decrypt encrypted content information. Therefore, a serial number allocated to the data storing apparatus is marked on the exterior of the data storing apparatus, and the device-specific key and a table that match the serial number are provided to the AS center.
  • When exchanging the storage unit with a new one, the AS center records a device-specific key matching the data storing apparatus in a flash memory of the exchanged data storing apparatus.
  • Alternatively, a directory key may be generated using a set of device keys.
  • In broadcast encryption, each of data storing apparatuses includes a device key set composed of at least one device key, e.g., DK1, DK2, . . . , DKm. When the number m of device keys is equal to or greater than the number n of directories, the device key DK1, DK2, . . . , DKm may be used as directory keys. In this case, the directory keys are given by: K 1 = DK1 K 2 = DK2 K n = DKn ( 6 )
  • In broadcast encryption, some of the device keys DK1, DK2, DKm are shared by another data storing apparatus. If the device keys DK1, DK2, DK4, DK6, and DK7 are allocated to a data storing apparatus A and the device keys DK1, DK2, DK4, DK6, and DK9 are allocated to a data storing apparatus B, the data storing apparatus A can decrypt directories stored in the data storing apparatus B using the device keys DK1, DK2, DK4, and DK6.
  • To prevent this problem, directory keys are generated to be characteristic to a data storing apparatus, using a device key. To make directory keys be characteristic to a data storing apparatus, the directory keys may be generated using the device key, i.e., a unique device key DKm, which is peculiarly allocated to the data storing device. In this case, the generated directory keys are given by: K 1 = f ( DK1 , DKm ) = DK1 DKm K 2 = f ( DK2 , DKm ) = DK2 DKm K n = f ( DKn , DKm ) = DKn DKm , ( 7 )
    wherein K1, K2, . . . , Kn denote directory keys; DK1, DK2, . . . , DKm denote device keys; and DKm denotes a device key peculiarly allocated to a data storing apparatus. In Equation (7), the number m of device keys must be greater than the number n of directory keys, i.e., m>n.
  • FIG. 6 is a flowchart illustrating a method of storing data using the apparatus 300 of FIG. 3, according to an embodiment of the present invention. Referring to FIG. 6, when the content information 302 is obtained from an external source, the directory key generator 320 generates the directory key 322 by inputting the device-specific key 342 given from the key storing unit 340 to a key generating function ƒ( ) (operation 610).
  • The device-specific key 342 may be a unique device key allocated to the apparatus 300 during broadcast encryption. The unique device key is allocated to a data storing apparatus, selected from a set of device keys allocated to a plurality of data storing apparatuses during broadcast encryption.
  • Alternatively, the device-specific key 342 may be a unique secret key allocated to the apparatus 300 when the data storing apparatus uses a public key structure that requires a pair of a secret key and a public key.
  • Alternatively, the device-specific key 342 may be any unique information provided to the apparatus 300, using various methods.
  • Next, the encryption unit 310 generates the encrypted content information 312 by encrypting the content information 302 using the directory key 322, and stores the encrypted content information 312 in the storage unit 350 (operation 620).
  • Next, when an external device requests the encrypted content information 312, the directory key generator 320 generate the directory key 342 by inputting the device-specific key 342 given from the key storing unit 340 to a key generating function ƒ( ) (operation 630).
  • Next, the decryption unit 360 extracts the encrypted content information 312 from the storage unit 350, and generates the decrypted content information 362 by decrypting the encrypted content information 312 using the directory key 324 (operation 640).
  • Next, the decrypted content information 362 is transmitted to the external device, and encrypted again by the encryption unit 310 and stored in the storage unit 350 after the external device uses the decrypted content information 362 (operation 650).
  • FIG. 7 is a flowchart illustrating a method of storing data using the apparatus 400 of FIG. 4, according to another embodiment of the present invention. Referring to FIG. 7, when the content information 402 is obtained from an external source, the directory key generator 420 generates the directory key 422 by inputting the device-specific key 442 given from the key storing unit 440 and the directory information 432 given from the directory storing unit 430 to a key generating function ƒ( ) (operation 710).
  • The key generating function ƒ( ) may be selected from the functions illustrated in FIG. 5B through 5D.
  • Next, the encryption unit 410 generates the encrypted content information 412 by encrypting the content information 402 using the directory key 422, and stores the encrypted content information 412 in the storage unit 450 (operation 720).
  • Next, when an external device requests the encrypted content information 412, the directory key generator 420 generates the directory key 424 by inputting the device-specific key 442 given from the key storing unit 440 to the key generating function ƒ( ) (operation 730).
  • Next, the decryption unit 460 extracts the encrypted content information 412 from the storage unit 450, and generates the decrypted content information 462 by decrypting the encrypted content information 412 using the directory key 424 (operation 740).
  • Next, the decrypted content information 462 is transmitted to the external device, and encrypted again by the encryption unit 410 and stored in the storage unit 450 after the external uses the decrypted content information 462 (operation 750).
  • FIGS. 8A and 8B are diagrams illustrating methods of using encrypted content information E(K1,I1), which is stored using a method according to embodiments of the present invention. Referring to FIG. 8A, the encrypted content information E(K1,I1) is decrypted using a directory key K1, and then encrypted using the directory key K1 and stored in a storage unit. That is, the directory key K1 is used in encrypting and decrypting the encrypted content information E(K1,I1), since the directory key K1 is generated using the device-specific key K and directory information D1 that will not be changed.
  • In contrast, referring to FIG. 8B, the encrypted content information E(K1,I1) is decrypted using a directory key K1, and then, encrypted using a directory key K1′ and stored in a storage unit. The directory key K1′ is different from the directory key K1, since the directory key K1′ is generated using a device-specific key K and a random number R1. The random number R1 changes every time a random number is generated, and is stored in a data storing apparatus.
  • Referring to FIGS. 8A and 8B, only a part of a content information file, which contains content information I1, is encrypted and decrypted, thereby minimizing consumption of resources required for encryption and decryption.
  • FIGS. 8C and 8D are diagrams illustrating methods of changing encrypted content information E(K1,I1) stored using a method according to the present invention, according to embodiments of the present invention. The methods of FIGS. 8C and 8D are the same as those of FIGS. 8A and 8B, except that content information I1 is changed into content information I1′.
  • However, a smaller amount of resources is required when deleting the content information I1 than when changing the content information I1. FIGS. 8E and 8F are diagrams illustrating a method of deleting encrypted content information E(K1,I1) stored using a method according to the present invention, according to embodiments of the present invention.
  • Referring to FIGS. 8E and 8F, encryption and decryption are performed in units of directories according to the present invention, and thus, decryption is not required in deleting the content information I1. On the other hand, conventionally, since a content information file is totally encrypted, it must be encrypted again even when only one piece of content information stored in the content information file is deleted.
  • Accordingly, a method of storing data according to the present invention enables a piece of content information stored in a content information file to be deleted without having to encrypt again the content information file, thereby reducing consumption of resources.
  • Although the present invention has been described with respect to content information, the present invention is not limited to this type of information. That is, the present invention can be applied to various types of data that can be divided in units of directories.
  • The present invention can be embodied as a computer readable program. Codes or code segments constituting the program could have been easily derived by computer programmers in the art. The program can be stored in a computer readable medium, and a method of storing data according to the present invention is performed when the program is read and executed using a computer. Here, the computer readable medium may be any recording apparatus capable of storing data that is read by a computer system, e.g., a magnetic recording medium, an optical recording medium, and a carrier wave.
  • As described above, according to the present invention, data, which is to be stored in a data storing apparatus, is divided into units of directories in which the data will be input to or output from the data storing apparatus, and the respective directories are encrypted using different directory keys, thereby minimizing consumption of resources required for encryption and decryption.
  • While this invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (23)

1. An apparatus for storing data in a device, the apparatus comprising:
a directory key generator generating a directory key required for encrypting and decrypting the data by inputting a device-specific key to a key generating function, the device-specific key being unique information allocated to the device and stored in a secure region of the device,
wherein the data is stored in at least one directory, and
the directory key is used in encrypting and decrypting the data in units of directories.
2. The apparatus of claim 1, further comprising:
an encryption unit encrypting the data using the directory key; and
a storage unit storing the encrypted data in units of directories.
3. The apparatus of claim 1, wherein the directory key generator generates the directory key by inputting the device-specific key and directory information, which specifies the directory, into the key generating function when the device requests the data.
4. The apparatus of claim 3, wherein the directory information comprises at least one of the name of the directory, the storing capacity of the directory, the name of the data stored in the directory, and a time when the data is stored in the directory.
5. The apparatus of claim 3, wherein the directory key is obtained by performing an XOR operation on the device-specific key and the directory information.
6. The apparatus of claim 3, wherein the directory key is obtained by encrypting the directory information using the device-specific key.
7. The apparatus of claim 1, further comprising a decryption unit generating decrypted data by reading the encrypted data from the storage unit and decrypting the encrypted data using the directory key when the device requests the data.
8. The apparatus of claim 1, wherein the directory key is obtained using a device key allocated to the device during broadcast encryption.
9. The apparatus of claim 7, wherein the device-specific key is a unique device key allocated to the device, and the unique device key is selected from device keys allocated using broadcast encryption.
10. The apparatus of claim 1, wherein whether the device-specific key matches the device is determined at an after-sales service center,
wherein an encryption key for the directory is extracted at the after-sales service center using the device-specific key when the device is replaced with another device.
11. The apparatus of claim 1, wherein the data is content information regarding content to be reproduced by the device, and
the content information comprises at least one of a content key and usage rules of the content which are required to encrypt and decrypt the content.
12. A method of storing data in a device, comprising:
generating a directory key by inputting a device-specific key into a key generating function, the directory key used to encrypt and decrypt the data, the device-specific key allocated to the device and stored in a secure region of the device,
wherein the data is stored in at least one directory, and
the directory key is used to encrypt and decrypt the data in units of directories.
13. The method of clam 12, further comprising:
generating encrypted data by encrypting the data using the directory key; and
storing the encrypted data in units of directories.
14. The method of claim 12, wherein the generation of the directory key comprises when the device requests the data, generating the directory key by inputting the device-specific key and directory information, which specifies the directory, into the key generating function.
15. The method of claim 14, wherein the directory information comprises at least one of the name of the directory, the storing capacity of the directory, the name of the data stored in the directory, and time when the data is stored in the directory.
16. The method of claim 14, wherein the generation of the directory key comprises performing an XOR operation on the device-specific key and the directory information.
17. The method of claim 14, wherein the generation of the directory key comprises encrypting the directory information using the device-specific key.
18. The method of claim 12, further comprising when the device requests the data, generating decrypted data by decrypting the encrypted data using the directory key.
19. The method of claim 12, wherein the directory key is generated using a device key allocated to the device during broadcast encryption.
20. The method of claim 18, wherein the device-specific key is a unique device key peculiarly allocated to the device, and the unique device key is selected from device keys allocated using broadcast encryption.
21. The method of claim 12, wherein the data is content information regarding content to be reproduced by the device, and the content information comprises at least one of a content key used to encrypt and decrypt the content, and usage rules of the content.
22. The method of claim 12, wherein whether the device-specific key matches the device is determined at an after-sales center,
wherein an encryption key for the directory is extracted at the after-sales center using the device-specific key when the device must be replaced with another device.
23. A computer readable recording medium storing a program for executing the method of claim 12 using a computer.
US11/244,007 2004-10-06 2005-10-06 Apparatus and method for storing data Abandoned US20060072763A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/244,007 US20060072763A1 (en) 2004-10-06 2005-10-06 Apparatus and method for storing data

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US61611904P 2004-10-06 2004-10-06
KR1020040086134A KR100580204B1 (en) 2004-10-06 2004-10-27 Apparatus and Method for storing data
KR10-2004-0086134 2004-10-27
US11/244,007 US20060072763A1 (en) 2004-10-06 2005-10-06 Apparatus and method for storing data

Publications (1)

Publication Number Publication Date
US20060072763A1 true US20060072763A1 (en) 2006-04-06

Family

ID=36994213

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/244,007 Abandoned US20060072763A1 (en) 2004-10-06 2005-10-06 Apparatus and method for storing data

Country Status (3)

Country Link
US (1) US20060072763A1 (en)
KR (1) KR100580204B1 (en)
CN (1) CN1831996A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008001327A2 (en) * 2006-06-30 2008-01-03 Koninklijke Philips Electronics N.V. Method and apparatus for encrypting/decrypting data
US20100095135A1 (en) * 2008-10-09 2010-04-15 Samsung Electronics Co., Ltd. Method and system for processing forward- locked DRM contents, and portable device adapted thereto
US9008316B2 (en) 2012-03-29 2015-04-14 Microsoft Technology Licensing, Llc Role-based distributed key management
US9026805B2 (en) 2010-12-30 2015-05-05 Microsoft Technology Licensing, Llc Key management using trusted platform modules

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732159B (en) * 2013-12-24 2019-01-25 北京慧眼智行科技有限公司 A kind of document handling method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US1310719A (en) * 1919-07-22 Secret signaling system
US5870468A (en) * 1996-03-01 1999-02-09 International Business Machines Corporation Enhanced data privacy for portable computers
US6070687A (en) * 1998-02-04 2000-06-06 Trw Inc. Vehicle occupant restraint device, system, and method having an anti-theft feature
US20020108055A1 (en) * 2000-07-24 2002-08-08 Takumi Okaue Data processing system, data processing method, and program providing medium
US20030005300A1 (en) * 2001-04-12 2003-01-02 Noble Brian D. Method and system to maintain portable computer data secure and authentication token for use therein
US20030086567A1 (en) * 2001-10-05 2003-05-08 Hitachi, Ltd. Digital information recording apparatus and recording/reproducing apparatus
US6609116B1 (en) * 1998-04-24 2003-08-19 International Business Machines Corporation System and method for securely updating copy-protected media

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08185349A (en) * 1994-12-28 1996-07-16 Casio Comput Co Ltd Data security device
US5625693A (en) * 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system
JPH10208388A (en) 1997-01-21 1998-08-07 Victor Co Of Japan Ltd Optical disc cipher key generating method, cipher key recording method, cipher key recording device, information reproducing method, information reproduction permitting method, and information reproducing device
US7076432B1 (en) * 1999-04-30 2006-07-11 Thomson Licensing S.A. Method and apparatus for processing digitally encoded audio data
KR20010055057A (en) * 1999-12-09 2001-07-02 구자홍 Method for limiting access to a rewritable optical disc
KR100346411B1 (en) * 2000-08-26 2002-08-01 조인구 Automatic Encryption and Decrytion Method of File and Moving Method of File Pointer Using Thereof, and Computer Readable Recording Medium Having Thereon Programmed Automatic Encryption and Decrytion Method of File and Moving Method of File Pointer Using Thereof
KR100479946B1 (en) * 2001-08-24 2005-03-30 주식회사 다림비젼 Digital video player having a security function
JP3716920B2 (en) * 2001-10-16 2005-11-16 ソニー株式会社 Recording medium reproducing apparatus and method, recording medium, and program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US1310719A (en) * 1919-07-22 Secret signaling system
US5870468A (en) * 1996-03-01 1999-02-09 International Business Machines Corporation Enhanced data privacy for portable computers
US6070687A (en) * 1998-02-04 2000-06-06 Trw Inc. Vehicle occupant restraint device, system, and method having an anti-theft feature
US6609116B1 (en) * 1998-04-24 2003-08-19 International Business Machines Corporation System and method for securely updating copy-protected media
US20020108055A1 (en) * 2000-07-24 2002-08-08 Takumi Okaue Data processing system, data processing method, and program providing medium
US20030005300A1 (en) * 2001-04-12 2003-01-02 Noble Brian D. Method and system to maintain portable computer data secure and authentication token for use therein
US20030086567A1 (en) * 2001-10-05 2003-05-08 Hitachi, Ltd. Digital information recording apparatus and recording/reproducing apparatus

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008001327A2 (en) * 2006-06-30 2008-01-03 Koninklijke Philips Electronics N.V. Method and apparatus for encrypting/decrypting data
WO2008001327A3 (en) * 2006-06-30 2008-02-21 Koninkl Philips Electronics Nv Method and apparatus for encrypting/decrypting data
US20090208019A1 (en) * 2006-06-30 2009-08-20 Koninklijke Philips Electronics N.V. Method and apparatus for encrypting/decrypting data
JP2009543415A (en) * 2006-06-30 2009-12-03 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Method and apparatus for encrypting / decrypting data
US9276739B2 (en) 2006-06-30 2016-03-01 Koninklijke Philips N.V. Method and apparatus for encrypting/decrypting data
US20100095135A1 (en) * 2008-10-09 2010-04-15 Samsung Electronics Co., Ltd. Method and system for processing forward- locked DRM contents, and portable device adapted thereto
US9026805B2 (en) 2010-12-30 2015-05-05 Microsoft Technology Licensing, Llc Key management using trusted platform modules
US9008316B2 (en) 2012-03-29 2015-04-14 Microsoft Technology Licensing, Llc Role-based distributed key management
US9634831B2 (en) 2012-03-29 2017-04-25 Microsoft Technology Licensing, Llc Role-based distributed key management

Also Published As

Publication number Publication date
KR20060030839A (en) 2006-04-11
CN1831996A (en) 2006-09-13
KR100580204B1 (en) 2006-05-16

Similar Documents

Publication Publication Date Title
KR100846255B1 (en) Enciphering device and method, deciphering device and method, and storage medium
RU2239954C2 (en) Encryption device and method, decryption device and method, and data processing method
US9071423B2 (en) Identification of a compromised content player
CN1287249C (en) Access control for digital content
US20080152134A1 (en) Efficient revocation of receivers
US20070160209A1 (en) Content management method, content management program, and electronic device
US20060161502A1 (en) System and method for secure and convenient handling of cryptographic binding state information
CN101312398A (en) Method and apparatus for encryption and sending content and method and apparatus for decrypting content
US8571209B2 (en) Recording keys in a broadcast-encryption-based system
JP2007234003A (en) Portable storage device and data management method thereof
MXPA03009297A (en) Method of protecting recorded multimedia content against unauthorized duplication.
KR20040015798A (en) Content reading apparatus
RU2369024C2 (en) System for protecting information content, device for generating key data and display device
KR20010015024A (en) Digital data recording device, digital data memory device, and digital data utilizing device for converting management information which contains restrictive information using a different key in each management information send/receive session
US8321660B2 (en) Method and devices for reproducing encrypted content and approving reproduction
US20060072763A1 (en) Apparatus and method for storing data
US7987361B2 (en) Method of copying and decrypting encrypted digital data and apparatus therefor
JP2001216727A (en) Information recording medium, recorder, recording method, reproducing device, reproducing method, recording and reproducing method and transmitting method
US20060075262A1 (en) Apparatus and method for securely storing data
WO2004028073A1 (en) Key management system
US20110271119A1 (en) Secure Data Storage and Transfer for Portable Data Storage Devices
KR100695665B1 (en) Apparatus and method for accessing material using an entity locked secure registry
JP5644467B2 (en) Information processing apparatus, information processing method, and program
JP2003204321A (en) Literary work protective system and key management system
KR20000055719A (en) Encryption method for digital data file

Legal Events

Date Code Title Description
AS Assignment

Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOU, YONG-KUK;CHOI, YUN-HO;KIM, CHI-HURN;REEL/FRAME:017071/0511

Effective date: 20050926

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION